System currently contains 112,857,727 malware samples.
| 177389a1204b9567365f1827a4b9d70d399057079f2a60a94d7088e5d498a3b5 |
| VirusShare info last updated 2026-05-22 00:00:01 UTC |
|
|
| MD5 | 31f48d6fe63e2f73f75221e3904925f8 |
| SHA1 | e046643b36e3c868441f1c2d8d009085c5a43097 |
| SHA256 | 177389a1204b9567365f1827a4b9d70d399057079f2a60a94d7088e5d498a3b5 |
| SSDeep | 3072:VGQeognyZpTrTPYtBzO3Dfh3rCw0Nwpwxsf1LViXUOj/d6UMaeXz:VGpohxrTyBi3DfOMBWUOb4UMa |
| Authentihash | 10910c06a9a78b835bf29335c7cfaa61ae491308d62fd0929da3fe9dc126c7c3 |
| Size | 479,263 bytes |
| File Type | PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows |
| Mime Type | application/x-dosexec |
| Extension | exe |
| TrID | Win32 Executable Microsoft Visual Basic 6 (78.0%) Win64 Executable (generic) (10.0%) Win32 Executable (generic) (4.2%) Windows Icons Library (generic) (1.9%) OS/2 Executable (generic) (1.9%)
|
Detections (52/67) | | ALYac | Gen:Variant.Application.fragtor.4629 | | APEX | Malicious | | AhnLab-V3 | Trojan/Win.Agent.R656323 | | Antiy-AVL | Trojan/Win32.VBClone | | Arcabit | Trojan.Application.fragtor.D1215 | | Avira | TR/Crypt.XPACK.Gen | | BitDefender | Gen:Variant.Application.fragtor.4629 | | Bkav | W32.AIDetectMalware | | CAT-QuickHeal | Trojan.LummaStl.S34571855 | | CTX | exe.unknown.fragtor | | ClamAV | Win.Dropper.Vbclone-10037699-0 | | CrowdStrike | win/malicious_confidence_100% (W) | | Cylance | Unsafe | | Cynet | Malicious (score: 100) | | DeepInstinct | MALICIOUS | | DrWeb | Trojan.MulDrop20.3145 | | ESET-NOD32 | Win32/VBClone.E trojan | | Elastic | malicious (high confidence) | | Emsisoft | Gen:Variant.Application.fragtor.4629 (B) | | F-Secure | Trojan.TR/Crypt.XPACK.Gen | | Fortinet | W32/VBClone.D!tr | | GData | Gen:Variant.Application.fragtor.4629 | | Google | Detected | | Ikarus | Trojan.Win32.VBClone | | Jiangmin | Trojan.Agent.fcjb | | K7AntiVirus | Trojan ( 005690671 ) | | K7GW | Trojan ( 005690671 ) | | Kaspersky | Trojan.Win32.VB.dosq | | Malwarebytes | Malware.AI.1316882565 | | MaxSecure | Virus.W32.GenericML.xnet | | McAfeeD | Trojan:Win/Vobfus.EJJ | | MicroWorld-eScan | Gen:Variant.Application.fragtor.4629 | | Microsoft | Trojan:Win32/Fareit.VB!MTB | | NANO-Antivirus | Trojan.Win32.AgentAGen.ledpuq | | Panda | Trj/Genetic.gen | | Rising | Trojan.VBClone!1.1072E (CLASSIC) | | SUPERAntiSpyware | Trojan.Agent/Gen-Tedy | | Sangfor | Trojan.Win32.Save.a | | SentinelOne | Static AI - Malicious PE | | Skyhigh | Trojan-JBCL!31F48D6FE63E | | Sophos | Mal/VB-AQT | | Symantec | Trojan.Dropper | | Tencent | Trojan.Win32.Vbclone.cc | | TrendMicro | Trojan.Win32.FAREIT.SME | | TrendMicro-HouseCall | Trojan.Win32.FAREIT.SME | | VBA32 | SScope.Trojan.VB | | VIPRE | Gen:Variant.Application.fragtor.4629 | | Varist | W32/VB.AED.gen!Eldorado | | VirIT | Trojan.Win32.VBUnicorn.AA | | Webroot | W32.Trojan.Gen | | ZoneAlarm | Mal/VB-AQT | | huorong | Trojan/VBClone.f | | VirusTotal Report submitted 2026-04-30 07:31:32 UTC |
|
| ExIF Data | | CharacterSet | Unicode | | CodeSize | 176128 | | CompanyName | UEFI | | EntryPoint | 0x13d4 | | FileFlags | (none) | | FileFlagsMask | 0x003f | | FileOS | Win32 | | FileSize | 468 kB | | FileSubtype | 0 | | FileType | Win32 EXE | | FileTypeExtension | exe | | FileVersion | 1 | | FileVersionNumber | 1.0.0.0 | | ImageFileCharacteristics | No relocs, Executable, No line numbers, No symbols, 32-bit, No debug, Removable run from swap, Net run from swap, Uniprocessor only, Bytes reversed hi | | ImageVersion | 1 | | InitializedDataSize | 299008 | | InternalName | Kawaii-Unicorn | | LanguageCode | Chinese (Simplified) | | LinkerVersion | 6 | | MIMEType | application/octet-stream | | MachineType | Intel 386 or later, and compatibles | | OSVersion | 4 | | ObjectFileType | Executable application | | OriginalFileName | Kawaii-Unicorn.exe | | PEType | PE32 | | ProductName | Kawaii-Unicorn | | ProductVersion | 1 | | ProductVersionNumber | 1.0.0.0 | | Subsystem | Windows GUI | | SubsystemVersion | 4 | | TimeStamp | 2019:01:19 13:34:56+00:00 | | UninitializedDataSize | 0 |
|